
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment
Wei Yao, Han Shi, Hai Zhao
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103622-103622
Closed Access | Times Cited: 27
Wei Yao, Han Shi, Hai Zhao
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103622-103622
Closed Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review
Sotiris Messinis, Nikos Temenos, Nicholas Ε. Protonotarios, et al.
Computers in Biology and Medicine (2024) Vol. 170, pp. 108036-108036
Open Access | Times Cited: 26
Sotiris Messinis, Nikos Temenos, Nicholas Ε. Protonotarios, et al.
Computers in Biology and Medicine (2024) Vol. 170, pp. 108036-108036
Open Access | Times Cited: 26
Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 37
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 37
A novel deep learning-based intrusion detection system for IoT DDoS security
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 10
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün
Internet of Things (2024) Vol. 28, pp. 101336-101336
Closed Access | Times Cited: 10
Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 73-73
Open Access | Times Cited: 7
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 73-73
Open Access | Times Cited: 7
Performance enhancement of artificial intelligence: A survey
Moez Krichen, Mohamed S. Abdalzaher
Journal of Network and Computer Applications (2024), pp. 104034-104034
Closed Access | Times Cited: 5
Moez Krichen, Mohamed S. Abdalzaher
Journal of Network and Computer Applications (2024), pp. 104034-104034
Closed Access | Times Cited: 5
Utilizing Generative Adversarial Networks for Secure Communication in Software-Defined Vehicles
Venkata Lakshmi Namburi
SAE technical papers on CD-ROM/SAE technical paper series (2025) Vol. 1
Closed Access
Venkata Lakshmi Namburi
SAE technical papers on CD-ROM/SAE technical paper series (2025) Vol. 1
Closed Access
Detecting attacks in Fog and cloud computing environments using Deep Learning: A systematic literature review
Ernesto Pimentel, Cristiano Antonio de Souza, Carlos Becker Westphall
Computer Networks (2025), pp. 111269-111269
Closed Access
Ernesto Pimentel, Cristiano Antonio de Souza, Carlos Becker Westphall
Computer Networks (2025), pp. 111269-111269
Closed Access
Security and Privacy Preservation via Interference Tolerant Fast Convergence Zeroing Neural Network With Reptile Search Optimization Algorithm in Fog‐Cloud Computing
P Kumar, Neha Verma, Shivani Gupta, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access
P Kumar, Neha Verma, Shivani Gupta, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access
Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks
Alexandro M. Zacaron, Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 3
Alexandro M. Zacaron, Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 3
Recon: Efficient Intrusion Recovery for Web Applications
Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access
Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access
Research on Intrusion Detection Method Based on Transformer and CNN-BiLSTM in Internet of Things
Chunhui Zhang, Jian Li, N. Wang, et al.
Sensors (2025) Vol. 25, Iss. 9, pp. 2725-2725
Open Access
Chunhui Zhang, Jian Li, N. Wang, et al.
Sensors (2025) Vol. 25, Iss. 9, pp. 2725-2725
Open Access
An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms
Mohammad Zubair Khan, Aijaz Ahmad Reshi, Shabana Shafi, et al.
Discover Sustainability (2025) Vol. 6, Iss. 1
Open Access
Mohammad Zubair Khan, Aijaz Ahmad Reshi, Shabana Shafi, et al.
Discover Sustainability (2025) Vol. 6, Iss. 1
Open Access
A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems
Erdal ÖZDOĞAN
IEEE Access (2024) Vol. 12, pp. 46785-46811
Open Access | Times Cited: 3
Erdal ÖZDOĞAN
IEEE Access (2024) Vol. 12, pp. 46785-46811
Open Access | Times Cited: 3
Network Intrusion Detection Based on Deep Belief Network Broad Equalization Learning System
Miaolei Deng, Chuanchuan Sun, Yupei Kan, et al.
Electronics (2024) Vol. 13, Iss. 15, pp. 3014-3014
Open Access | Times Cited: 3
Miaolei Deng, Chuanchuan Sun, Yupei Kan, et al.
Electronics (2024) Vol. 13, Iss. 15, pp. 3014-3014
Open Access | Times Cited: 3
Research on Adaptive 1DCNN Network Intrusion Detection Technology Based on BSGM Mixed Sampling
Wei Ma, Chao Gou, Yunyun Hou
Sensors (2023) Vol. 23, Iss. 13, pp. 6206-6206
Open Access | Times Cited: 7
Wei Ma, Chao Gou, Yunyun Hou
Sensors (2023) Vol. 23, Iss. 13, pp. 6206-6206
Open Access | Times Cited: 7
High-precision intrusion detection for cybersecurity communications based on multi-scale convolutional neural networks
Hao Yang, Junyang Yu, Rui Zhai
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 2
Hao Yang, Junyang Yu, Rui Zhai
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 2
Privacy-Preserving Collaborative Intrusion Detection in Edge of Internet of Things: A Robust and Efficient Deep Generative Learning Approach
Wei Yao, Zhao Hai, Han Shi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 9, pp. 15704-15722
Closed Access | Times Cited: 6
Wei Yao, Zhao Hai, Han Shi
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 9, pp. 15704-15722
Closed Access | Times Cited: 6
TIBS: A Deep-Learning Model for Network Intrusion Detection for SDN Environments
Yilin Zhang, Xiaoming Wu, Huomin Dong
2022 7th International Conference on Computer and Communication Systems (ICCCS) (2024), pp. 419-426
Closed Access | Times Cited: 1
Yilin Zhang, Xiaoming Wu, Huomin Dong
2022 7th International Conference on Computer and Communication Systems (ICCCS) (2024), pp. 419-426
Closed Access | Times Cited: 1
Generative AI for Threat Hunting and Behaviour Analysis
Siva Raja Sindiramutty, N. Z. Jhanjhi, Rehan Akbar, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 235-286
Closed Access | Times Cited: 1
Siva Raja Sindiramutty, N. Z. Jhanjhi, Rehan Akbar, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 235-286
Closed Access | Times Cited: 1
Exploring the ALNS method for improved cybersecurity: A deep learning approach for attack detection in IoT and IIoT environments
Sarra Cherfi, Ammar Boulaiche, Ali Lemouari
Internet of Things (2024) Vol. 28, pp. 101421-101421
Closed Access | Times Cited: 1
Sarra Cherfi, Ammar Boulaiche, Ali Lemouari
Internet of Things (2024) Vol. 28, pp. 101421-101421
Closed Access | Times Cited: 1
Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
Abdul Razaque, Joon Yoo, Gulnara Bektemyssova, et al.
Sensors (2023) Vol. 23, Iss. 24, pp. 9690-9690
Open Access | Times Cited: 3
Abdul Razaque, Joon Yoo, Gulnara Bektemyssova, et al.
Sensors (2023) Vol. 23, Iss. 24, pp. 9690-9690
Open Access | Times Cited: 3
Balancing Data Privacy and 5G VNFs Security Monitoring: Federated Learning with CNN + BiLSTM + LSTM Model
Abdoul-Aziz Maiga, Edwin Ataro, Stanley Githinji
Journal of Electrical and Computer Engineering (2024) Vol. 2024, pp. 1-16
Open Access
Abdoul-Aziz Maiga, Edwin Ataro, Stanley Githinji
Journal of Electrical and Computer Engineering (2024) Vol. 2024, pp. 1-16
Open Access
Zeekflow+: A Deep LSTM Autoencoder with Integrated Random Forest Classifier for Binary and Multi-class Classification in Network Traffic Data
Emmanouil Arapidis, Nikos Temenos, Dimitrios Giagkos, et al.
(2024), pp. 613-618
Open Access
Emmanouil Arapidis, Nikos Temenos, Dimitrios Giagkos, et al.
(2024), pp. 613-618
Open Access
Attenuating majority attack class bias using hybrid deep learning based IDS framework
K. Gowri Raghavendra Narayan, Rakesh Ganesula, T Somasekhar, et al.
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103954-103954
Closed Access
K. Gowri Raghavendra Narayan, Rakesh Ganesula, T Somasekhar, et al.
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103954-103954
Closed Access
Generative adversarial networks to detect intrusion and anomaly in IP flow-based networks
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Luiz F. Carvalho, et al.
Future Generation Computer Systems (2024) Vol. 163, pp. 107531-107531
Closed Access
Vitor Gabriel da Silva Ruffo, Daniel Matheus Brandão Lent, Luiz F. Carvalho, et al.
Future Generation Computer Systems (2024) Vol. 163, pp. 107531-107531
Closed Access